How can a system administrator secure a WebSphere Application Server environment to ensure that an application
How can a system administrator secure a WebSphere Application Server environment to ensure
that an application code will not be allowed to access any files in the server’s file system?
How can a system administrator fix the issue ensuring only authorized access?
A newly deployed application has authorization errors when invoking EJB methods from a servlet.
An additional review indicates that users are authenticated, but do not have the correct
authorization.
How can a system administrator fix the issue ensuring only authorized access?
How can the administrator handle this requirement?
A system administrator needs to deploy a new enterprise application which requires that
application security be enabled, but, the existing applications in the cell can not be executed with
application security enabled. The cell has the global security and Java 2 security disabled.
How can the administrator handle this requirement?
How should the administrator do this?
A system administrator needs to view the list of certificates for unmanaged web server located on
a remote system.
How should the administrator do this?
What should the administrator do to implement the required security configuration?
A system administrator is configuring the security of a new environment. The administrator has
been asked to configure one LDAP server that has different sub-trees for business users and
administration users.
What should the administrator do to implement the required security configuration?
What can the system administrator configure to ensure users can continue to work if one of the cluster server
A web application was deployed on a WebSphere Application Server cluster. While users are
using the application, one of the cluster servers fails and the users lose their working data.
What can the system administrator configure to ensure users can continue to work if one of the
cluster server fails?
How can the administrator fix this problem?
A system administrator has created a cluster containing two servers in a same node. The
administrator did not select the option Generate unique HTTP ports during the creation of the
cluster members. After the cluster creation, the administrator changed the HTTP port of the
second cluster member to 9081.
Testing the servers using the snoop servlet directly to the server’s HTTP port, the administrator
got the following error message for the second server;
SRVE0255E: A WebGroup/Virtual Host to handle server2:9081 has not been defined
How can the administrator fix this problem?
What should the administrator do to the plugin-cfg.xml file to ensure that requests for default_host_myApp URI
A web application is hosted on an application server that receives HTTP requests from a third
party application named myApp. The URlGroup mapping for this application is called
default_host_myApp.
The development team asks a system administrator to configure the HTTP plug-in to prevent
routing requests to any application server except serverl.
The following exhibit shows the parts of the plugin-cfg.xml file that are relevant for myApp. The
UriGroups for other applications are not shown in the exhibit.
What should the administrator do to the plugin-cfg.xml file to ensure that requests for
default_host_myApp URIGroup are routed only to machine1?
How can the system administrator reduce the memory and CPU resource usage of the core group coordinator?
A system administrator has configured a cluster containing 40 servers. The cluster members all
belong to one core group. While examining the log files, the administrator notices that the core
group coordinator is consuming abnormally high amounts of memory and CPU resources.
How can the system administrator reduce the memory and CPU resource usage of the core group
coordinator?
What should the administrator do to enable this environment for high availability and scalability of the appli
A system administrator needs to set a new Liberty profile environment to support an application.
What should the administrator do to enable this environment for high availability and scalability of
the application?